Logical Access Control

Cards (19)

  • Logical access: Restrict access to IT systems.
  • Principle of least privilege: Users should only be given access to the level required for their work.
  • Access control list (ACL): List of rules on a device that defines who can access that device.
  • Multifactor Authentication requires users to provide 2 or more types of authentication factors to gain access.
  • Identification: Identifying details to a machine.
  • Authentication: Proving your identification.
  • Authorisation: Determines what an authorised user can do.
  • Accounting: Tracks what a user does on a computer.
  • Hard token: Hardware device used to generate a number used to login.
  • Soft token: Digital version of a physical token.
  • ·   How to send a PIN:
     
    1        Email
    2        Short Message Service
    3        Voice Call
    4        Authenticator Application
  • Mobile device management (MDM) enforces policies and procedures over the entire mobile device.
  • Mobile application management (MAM) targets application.
  • Knowledge-based : Something you know
  • Possession-based: Something you have
  • Biometrics or bodily characteristics: Something you are
  • Location: Somewhere you are
  • Behavioral: Something you do

    E.g., A written signature
  • Access Control List: Determines which users have access to a resource.